### [CVE-2024-46901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46901) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Subversion&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen) ### Description Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.Repositories served via other access methods are not affected. ### POC #### Reference No PoCs from references. #### Github - https://github.com/devhaozi/CVE-2024-46901 - https://github.com/nomi-sec/PoC-in-GitHub